Enterprise network: Security enhancement and policy management using next-generation firewall (ngfw)

被引:3
作者
Arefin M.T. [1 ]
Uddin M.R. [1 ]
Evan N.A. [1 ]
Alam M.R. [2 ]
机构
[1] Daffodil International University, Dhaka
[2] Texas A&M University-Kingsville, Kingsville
来源
Lecture Notes on Data Engineering and Communications Technologies | 2021年 / 66卷
关键词
Enterprise network; Firewall; Network security; NGFW;
D O I
10.1007/978-981-16-0965-7_59
中图分类号
学科分类号
摘要
Network security is considered as a major task in network architecture. A network administrator had to focus, and it is defined and demonstrated as the rules, plans, and procedures followed by a network administrator to protect the network devices from different threats, and simultaneously, the passive and active attacks are generated from various vulnerable sources. Further, the unauthorized users must be prevented from accessing the network. There are different types of threats that need to be identified, explored, and take a step for preventing it, wherein the attacks are like DoS and DDos attracts, Aurora attacks, malware attack, port scanning, password sniffer, IP spoofing, session hijacking, and man-in-the-middle attacks, and cyber-attacks. This could be done with the help of firewalls, which can secure the network from malicious attacks. This paper is more focused on strong policy and performs incredible directions for averting the mentioned attacks. Firewalls are one of the strongest hardware attachments to secure the zone of networking sectors like local large, multinational, or enterprise networks. The deployment of firewalls that enforce an organization’s security policy is network devices. For this kind of tiresomeness, the concern of this paper is to enhance and develop network security like IPsec VPN, strong masquerades, port forwarding, create a trusted zone on WAN and LAN side, etc., based on the firewall by the execution of various tasks and different policies. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021.
引用
收藏
页码:753 / 769
页数:16
相关论文
共 17 条
[1]  
Chen L.C., Lin C., Combining theory with practice in information security education, Proceedings of the 11Th Colloquium for Information Systems Security Education, pp. 28-35, (2007)
[2]  
Trabelsi Z., Ibrahim W., A hands-on approach for teaching denial of service attacks: A case study, J Inf Technol Educ Innovations Pract, 12, pp. 299-319, (2013)
[3]  
Bouhoula A., Trabelsi Z., Barka E., Benelbahri M.A., Firewall filtering rules analysis for anomalies detection, Int J Secur Netw, 3, 3, pp. 161-172, (2008)
[4]  
Trabelsi Z., Zeidan S., Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement, 2012 IEEE International Conference on Communications (ICC). IEEE, pp. 1074-1078, (2012)
[5]  
Trabelsi Z., Zhang L., Zeidan S., Dynamic rule and rule-field optimisation for improving firewall performance and security, IET Inf Secur, 8, 4, pp. 250-257, (2014)
[6]  
Trabelsi Z., Shuaib K., A novel man-in-the-middle intrusion detection scheme for switched LANs, Int J Comput Appl, 30, 3, pp. 234-243, (2008)
[7]  
Alnagi K.W., Developing Security-Enhanced Model for Enterprise Network. Developing Security-Enhanced Model for Enterprise Network, (2014)
[8]  
Gaigole M.S., Kalyankar M.A., The study of network security with its penetrating attacks and possible security mechanisms, Int J Comput Sci Mob Comput, 45, 5, pp. 728-735, (2015)
[9]  
Ritchot B., An enterprise security program and architecture to support business drivers, Technol Innov Manag Rev, 3, 8, (2013)
[10]  
Taluja M.S., Dua R.L., Survey on network security, threats & firewalls, Int J Adv Res Comput Eng Technol (IJARCET), 1, 7, (2012)